Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Prof. Dr. Jan Jürjens

Institut für Softwaretechnik, Universität Koblenz

Publikationen
Ergebnisse pro Seite:  50


Jürjens, Jan

Sicherheitszertifizierung für den Industrial Data Space

3. Forschungstag IT-Sicherheit NRW. 2016


Pape, Sebastian; Flake, Julian; Beckmann, Andreas et al.

STAGE - Software Tool for Automatic Grading of Testing Exercises: Case Study Paper

Laura Dillon;Willem Visser;Laurie Williams (Hrsg). Proceedings of the 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering ICSE 2016; 14-22 May, 2016; Austin, Texas, USA. New York, NY: ACM Association for Computing Machinery 2016 S. 491 - 500


Pape, Sebastian; Flake, Julian; Beckmann, Andreas et al.

STAGE: a software tool for automatic grading of testing exercises: case study paper.

ICSE (Companion Volume). 2016 S. 491 - 500


Ahmadian, Amir Shayan; Jürjens, Jan

Supporting Model-based Privacy Analysis by Exploiting Privacy Level Agreements

Sébastien Varrette;Pascal Bouvry;Albert Y. Zomaya (Hrsg). Proceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science CloudCom 2016: 12–15 December 2016; Luxembourg City, Luxembourg. Los Alamitos, CA: IEEE Computer Society 2016 S. 360 - 365


Shayan Ahmadian, Amir; Jürjens, Jan

Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements.

CloudCom. 2016 S. 360 - 365


Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan

Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds

Boris Shishkov (Hrsg). Business Modeling and Software Design: 5th International Symposium, BMSD 2015, Milan, Italy, July 6–8, 2015, Revised Selected Papers. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2016 S. 80 - 95



Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.

UMLchange - Specifying Model Changes to Support Security Verification of Potential Evolution

Jens Knoop;Uwe Zdun (Hrsg). Software Engineering 2016: Fachtagung des GI-Fachbereichs Softwaretechnik; 23.-26. Februar 2016 Wien, Proceedings. Bonn: Gesellschaft für Informatik 2016 S. 91 - 92


Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.

Umlchange - specifying model changes to support security verification of potential evolution.

Software Engineering. 2016 S. 91 - 92


Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.

A Platform for Empirical Research on Information System Evolution

Marek Reformat;Haiping Xu;Kehan Gao;Shihong Huang (Hrsg). Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering SEKE 2015: Technical Program; July 6 – 8, 2015; Wyndham Pittsburgh University Center, Pittsburgh, USA. Pittsburgh: Knowledge Systems Institute 2015 S. 415 - 420


Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.

A Platform for Empirical Research on Information System Evolution.

SEKE. 2015 S. 415 - 420


Jürjens, Jan

Beyond One-Shot Security: Keeping Software Secure during Evolution

12. Jahrestreffen der GI-FG FFormale Methoden und Software Engineering für Sichere Systeme (FoMSESS). Bremen. 2015







Stocker, Joachim; Wenzel, Sven; Jürjens, Jan

IT-Risiko-Check: Das Wissen um geschäftskritische IT- Risiken

Peter Schartner;Kerstin Lemke-Rust;Markus Ullmann (Hrsg). D-A-CH security 2015: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Frechen: Syssec 2015 S. 279 - 290


Jürjens, Jan; Shayan Ahmadian, Amir

Model-based Security Analysis and Applications to Security Economics: Invited Talk

International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015). 2015


Jürjens, Jan; Shayan Ahmadian, Amir

Model-based Security Analysis and Applications to Security Economics.

MODELSWARD. 2015 S. 674 - 677


Jürjens, Jan

Modellbasiertes Sicherheits-Testen für Cloud-basierte Prozesse

Software-QS-Tag 2015. 2015


Jürjens, Jan

Ökonomische Analyse von Sicherheitsmaßnahmen (Eingeladener Vortrag)

Arbeitstreffen der Allianz für Sicherheit in der Wirtschaft e.V. 2015


Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.

Preserving Validity of Batch-Job Nets under Change at Run-Time

Sheikh Iqbal Ahamed;Carl K. Chang;William Chu;Ivica Crnkovic;Pao-Ann Hsiung;Gang Huang;Jingwei Yang (Hrsg). Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference Workshops COMPSAC 2015: Volume 2; 1–5 July 2015; Taichung, Taiwan. Los Alamitos, CA: IEEE Computer Society 2015 S. 169 - 178


Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.

Preserving Validity of Batch-Job Nets under Change at Run-Time.

COMPSAC. 2015 S. 169 - 178


Bürger, Jens; Jürjens, Jan; Wenzel, Sven

Restoring security of evolving software models using graph transformation

International Journal on Software Tools for Technology Transfer. Bd. 17. H. 3. Berlin: Springer 2015 S. 267 - 289


Bürger, Jens; Jürjens, Jan; Wenzel, Sven

Restoring security of evolving software models using graph transformation.

STTT. Bd. 17. H. 3. 2015 S. 267 - 289


Bürger, Jens; Gärtner, Stefan; Ruhroth, Thomas et al.

Restoring Security of Long-Living Systems by Co-evolution.

COMPSAC. 2015 S. 153 - 158


Jürjens, Jan

Secure Database Development

Encyclopedia of Database Systems. Springer 2015 S. TBD


Jürjens, Jan

Security Certification in the Presence of Evolution: Models vs. Code (Invited talk)

Software Engineering and Formal Methods - SEFM 2014 Collocated Workshops, Revised Selected Papers. 2015 S. XIX - XX (LNCS)


Rahman, Md. Shamimur; Sadi, Muhammad Sheikh; Ahammed, Sakib et al.

Soft Error Tolerance using Horizontal-Vertical- Double-Bit Diagonal parity method

Felix Pasila;Yusak Tanoto;Resmana Lim;Murtiyanto Santoso;Nemuel Daniel Pah (Hrsg). Proceeding of the 2nd International Conference on Electrical Engineering and Infomation Communication Technology iCEEiC 2015: 21 - 23 May 2015; Jahangirnagar University, Savar, Dhaka, Bangladesh. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2015 S. 1 - 6


Rosado, David G.; Lammari, Nadira; Jürjens, Jan

Special Issue on Secure Information Systems Engineering

The Computer Journal. Bd. 58. H. 10. Oxford: Oxford University Press 2015 S. 2193 - 2194


G. Rosado, David; Lammari, Nadira; Jürjens, Jan

Special Issue on Secure Information Systems Engineering.

Comput. J. Bd. 58. H. 10. 2015 S. 2193 - 2194


Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan

Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds.

BMSD. 2015 S. 80 - 95


Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan

Supporting the Security Certification of Cloud-Computing- Infrastructures: Invited Paper

Fifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 10


Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.

The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution.

International Journal of Software Engineering and Knowledge Engineering. Bd. 25. H. 9-10. 2015 S. 1715 - 1720


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge

Uwe Aßmann;Birgit Demuth;Thorsten Spitta;Georg Püschel;Ronny Kaiser (Hrsg). Software Engineering & Management 2015 - Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März - 20. März 2015 in Dresden. Bonn: Gesellschaft für Informatik 2015 S. 83 - 84 (Lecture Notes in Informatics)


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge.

Software Engineering & Management. 2015 S. 83 - 84


Jürjens, Jan

Towards Security of Adaptable Information Systems - Current Views and Future Perspectives: Invited Panel Participation

Fifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 3


Jürjens, Jan

Transparenz und Sicherheit in der Lieferkette

Arbeitstreffen des Bundesverband Deutscher Postdienstleister. 2015


Jürjens, Jan; Wenzel, Sven

Werkzeug für Wirtschaftlichkeit und Effektivität zum Erstellen von Sicherheitskonzepten

WIK : Zeitschrift für die Sicherheit der Wirtschaft. Bd. 5. Ingelheim: SecuMedia 2015 S. keine Angaben




Jürjens, Jan; Piessens, Frank; Bielova, Nataliia

Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings

Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 (LNCS)


Felderer, Michael; Katt, Basel; Kalb, Philipp et al.

Evolution of Security Engineering Artifacts: A State of the Art Survey

International Journal of Secure Software Engineering. Bd. 5. H. 4. Hershey, PA: IGI Global 2014 S. 48 - 98


Felderer, Michael; Katt, Basel; Kalb, Philipp et al.

Evolution of Security Engineering Artifacts: A State of the Art Survey.

IJSSE. Bd. 5. H. 4. 2014 S. 48 - 98


Jürjens, Jan

Geschäftsprozesse in der Cloud -- aber sicher! (... und compliant)

Software Engineering + Architecture (SEACON 2014). 2014 S. 1 - 83


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.

Guiding a general-purpose C verifier to prove cryptographic protocols

Journal of Computer Security. Bd. 22. H. 5. Amsterdam: IOS Press 2014 S. 823 - 866


Dupressoir, François; D. Gordon, Andrew; Jürjens, Jan et al.

Guiding a general-purpose C verifier to prove cryptographic protocols.

Journal of Computer Security. Bd. 22. H. 5. 2014 S. 823 - 866


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge

Tony Gorschek;Robyn Lutz (Hrsg). Proceeding of the 2014 IEEE 22nd International Requirements Engineering Conference RE: August 25-29, 2014; Karlskrona, Sweden. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2014 S. 103 - 112